Download presentation
Presentation is loading. Please wait.
Published byAlfred Bridges Modified over 9 years ago
1
Slide 3-1 Chapter 3 Electronic Commerce and Internet Technologies Introduction to Information Systems Judith C. Simon
2
Slide 3-2 "Copyright © 2001 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976 United States Copyright Act without the express written permission of the copyright owner is unlawful. Request for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein."
3
Slide 3-3 Chapter 3 Major Topics ä Electronic data interchange ä Introduction to the Internet ä Business examples of Internet electronic commerce ä Security issues of Internet electronic commerce ä Expected growth of Internet electronic commerce ä Additional Internet technologies
4
Slide 3-4 Electronic Commerce (E-Commerce) Overview ä Also called e-business ä Refers to commercial transactions in electronic form
5
Slide 3-5 Communications Software ä Manages transmission of data between computers (provides appropriate instructions to hardware) ä Used to transfer files and to send messages (electronic mail) ä Available with some operating systems, as well as with some related hardware such as a modem, or as a separate purchase
6
Slide 3-6 Electronic Data Interchange (EDI) ä Has been in use for several decades (longer than business uses of the Internet have existed) ä Purpose/use is to send data over communication lines as secure, direct links between organizations
7
Slide 3-7 Internet Introduction ä Internet: international network of networks ä Overall cost of communication is considered low, but some parts of the world lack the needed technology ä TCP/IP: set of protocols (rules) used for Internet transmissions ä Security of messages and data continues to be a concern
8
Slide 3-8 Internet Access ä ISP: Internet Service Provider, such as AOL ä Domain: Type of organization providing access, such as.com (commercial) or.edu (educational) ä Email address pattern: username@host.domain ä example: johndoe@aol.com ä example: janedoe@memphis.edu
9
Slide 3-9 World Wide Web (WWW or “Web”) ä Designed in 1989 to help researchers to collaborate over the Internet ä Hypertext: links that can take the user directly to other data stored locally or externally ä Hypermedia: use of nontext media, such as images, sound, animation
10
Slide 3-10 World Wide Web, continued ä HTML: Hypertext markup language, the basic code used developing for Web pages ä HTTP: Hypertext transfer protocol, rules for distributing or transmitting hypertext files (Web pages) ä Browser: software (e.g., Netscape, Internet Explorer) used to retrieve HTML documents and display them on a computer screen; has capability of interpreting code and handling hyperlinks
11
Slide 3-11 Management Concerns - World Wide Web ä Is developing and maintaining a home page worth the time and expense involved to the organization? ä Can business transactions be processed safely? ä Is employee access to the Web worth the expense? If so, which employees need access? Should access be restricted or monitored?
12
Slide 3-12 Security Issues of E-Commerce ä Digital certificates: used for identification and for exchanging with another party for security of transactions ä Both public and private certificates are available. Public may be used for identification as a customer purchasing products online. Private is often used when access is limited to specified persons, who can be provided with the private certificates. A combination of both types may be used for additional security.
13
Slide 3-13 Electronic Mail (email) ä Email: sending and receiving messages by computer system; very widely used in businesses and homes ä Electronic eavesdropping: reading and perhaps storing (without permission) messages sent to someone else ä Emoticon (emotional icon): used to indicate intended feelings, e.g., :-) = smile to indicate intended humor
14
Slide 3-14 Electronic Mail ä An advantage: ä Messages can be sent and responses received very quickly. ä A disadvantage: ä Confidentiality is not ensured: for example, a message intended to be private could be forwarded to 1000 additional persons.
15
Slide 3-15 Electronic Mail Emoticons ä How would you interpret these emoticons if seen in a message you received? ä :-K:-@ ä :’-(*:O) ä C=:-):-I ä :-\‘:-)
16
Slide 3-16 Electronic Mail Emoticons ä Typical intended meanings of certain emoticons: ä :-K beats me:-@ screaming ä :’-(crying*:O) clowning ä C=:-)cooking:-I Hmmm ä :-\skeptical‘:-)devilish
17
Slide 3-17 Management Concerns - Electronic Mail ä Are employees using email capabilities only for intended purposes? ä Have procedures been provided identifying specific usage policies? ä Should employee email messages be monitored?
18
Slide 3-18 Telecommuting ä Telecommuting: employee working at home and transferring data to and from office ä Teleworking: form of telecommuting referring to working away from the office but not necessarily to home (“telecommuting” is sometimes used to refer to this option, too) ä Virtual office: seeming to be conducting business from an office, without needing to be in any one location
19
Slide 3-19 Telecommuting, continued ä Advantages include reduction in travel time and travel cost, pollution, ability to work any time of day or night, reduction in needed office space ä Disadvantages include problems with supervision of employees, lack of social interaction, inappropriateness for some types of jobs
20
Slide 3-20 File Transfer Protocol (FTP) ä FTP: rules used to transfer files from one location to another ä Software is available for this use, such as WS_FTP. ä Browsers can also be used to access files. Instead of using HTTP:// preceding a desired Web address, FTP:// is used to indicate the rules to use preceding the name and location of the desired file
21
Slide 3-21 Newsgroups ä Newsgroups: discussion areas available on a continually expanding, wide range of topics. People who access a newsgroup can simply read information provided by others or can add (“post”) their own information to the newsgroup. ä Newsgroups have several main categories of topics, as well as subcategories separated by dots, e.g., misc.jobs.offered ä FAQs: frequently asked questions; these should be read before contributing to a newsgroup
22
Slide 3-22 Mailing Lists ä Also called “LISTSERVs” ä Use email for discussions; messages go to everyone who has subscribed. May be moderated or unmoderated. If unmoderated, no one screens messages before they are transmitted to list. ä Spamming: using mailing lists to send undesired materials such as advertisements to those on mailing list
23
Slide 3-23 Intranets ä Intranet: use of Internet technology for communication within an organization. Web pages are used to provide internal data. Usually quicker and less expensive to change/update than printed materials. ä Firewall: form of security to prevent outsiders from accessing internal data or to restrict internal users to particular sections
24
Slide 3-24 Extranets ä Extranet: use of Internet technology for communication between organizations, where the outside organization has access to designated parts of the intranet, e.g., for monitoring inventory and the need for materials/supplies
25
Slide 3-25
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.